Thursday, December 30, 2010

'Data Cap' - NTC's proposed data caps violate consumer rights, lawyer says

I've been a 3G broadband user since 2007, and now such policy has to be materialized in-order to serve millions of user wirelessly.

If you observe those Blackberry users are kinda tech savvy fond of twitting and posting stats on FB and same with iPhone users, Smartphones has began since around +5 years ago and yet the real bandwidth which is capable of, can only be experienced smoothly right now.

Imagine how many users on mobile passing to all that microwave repeaters/cellsites with different comm-features (text, calls & internet) if without certain restrictions, real heavy net traffic can be experienced.

Although, in near future, much larger data bandwidth can be serve to us like HSPA, HSUPA & 4G.





Thursday, November 18, 2010

Install Squirrel Mail on Ubuntu 10.04 server

To install the SquirrelMail webmail client, run

aptitude install squirrelmail

Then create the following symlink...

ln -s /usr/share/squirrelmail/ /var/www/webmail

... and configure SquirrelMail:

squirrelmail-configure

We must tell SquirrelMail that we are using Courier-IMAP/-POP3:

SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- D


SquirrelMail Configuration : Read: config.php
---------------------------------------------------------
While we have been building SquirrelMail, we have discovered some
preferences that work better with some servers that don't work so
well with others. If you select your IMAP server, this option will
set some pre-defined settings for that server.

Please note that you will still need to go through and make sure
everything is correct. This does not change everything. There are
only a few settings that this will change.

Please select your IMAP server:
bincimap = Binc IMAP server
courier = Courier IMAP server
cyrus = Cyrus IMAP server
dovecot = Dovecot Secure IMAP server
exchange = Microsoft Exchange IMAP server
hmailserver = hMailServer
macosx = Mac OS X Mailserver
mercury32 = Mercury/32
uw = University of Washington's IMAP server
gmail = IMAP access to Google mail (Gmail) accounts

quit = Do not change anything
Command >>
<-- courier


SquirrelMail Configuration : Read: config.php
---------------------------------------------------------
While we have been building SquirrelMail, we have discovered some
preferences that work better with some servers that don't work so
well with others. If you select your IMAP server, this option will
set some pre-defined settings for that server.

Please note that you will still need to go through and make sure
everything is correct. This does not change everything. There are
only a few settings that this will change.

Please select your IMAP server:
bincimap = Binc IMAP server
courier = Courier IMAP server
cyrus = Cyrus IMAP server
dovecot = Dovecot Secure IMAP server
exchange = Microsoft Exchange IMAP server
hmailserver = hMailServer
macosx = Mac OS X Mailserver
mercury32 = Mercury/32
uw = University of Washington's IMAP server

quit = Do not change anything
Command >> courier

imap_server_type = courier
default_folder_prefix = INBOX.
trash_folder = Trash
sent_folder = Sent
draft_folder = Drafts
show_prefix_option = false
default_sub_of_inbox = false
show_contain_subfolders_option = false
optional_delimiter = .
delete_folder = true

Press any key to continue...
<-- ENTER


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- S


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >> S

Data saved in config.php
Press enter to continue...
<-- ENTER


SquirrelMail Configuration : Read: config.php (1.4.0)
---------------------------------------------------------
Main Menu --
1. Organization Preferences
2. Server Settings
3. Folder Defaults
4. General Options
5. Themes
6. Address Books
7. Message of the Day (MOTD)
8. Plugins
9. Database
10. Languages

D. Set pre-defined settings for specific IMAP servers

C Turn color on
S Save data
Q Quit

Command >>
<-- Q

Afterwards you can access SquirrelMail under http://server1.example.com/webmail or http://192.168.0.100/webmail:

Monday, November 15, 2010

How to add a user to the sudoers list

How to add a user to the sudoers list? Beleive it or not, this is a fairly common question and in all reality the answer is quite simple. Adding a user to the sudoers list on a fully installed Linux system such as Debian is only possible via the command visudo. Users in the sudoers list are allowed the privileges to run commands and open files as the root user. In the following quick tutorial, we will show you how adding a new sudoer is quickly done.

How to add a user to the sudoers list:

  1. Open a Root Terminal and type visudo (to access and edit the list)
  2. Using the up/down arrows, navigate to the bottom of the sudoers file that is now displayed in the terminal
  3. Just under the line that looks like the following:
  4. root ALL=(ALL) ALL

  5. Add the following (replacing user with your actual username):
  6. user ALL=(ALL) ALL

  7. Now press Ctrl+X and press Y when promted to save

That's it, your new user now has root privileges!

Example Sudoers Screenshot:

Adding a new sudoer

Saturday, November 6, 2010

My old server room

Back in 2004, this is my training grounds after my contract in Toshiba as ISG data center support. I am the MIS assistant of a multi-national company that has four branches located in different areas in Laguna. I was stationed on their logistics head quarters in laguna technopark.

My network hosts 3 branches, we are the 4th and act as main host provider to Binan, Cabuyao and Calamba factories; all branches interconnected via private leased line. We have ATM direct network from HK and VPN's serving VoIP phones between HK, UK and PH.

It was a very simple network consisting one primary domain controller (windows 2000 server), and four mail servers running POP3 iMAIL.

My main network head units consists of cisco routers/catalyst, HP/Compaq server, 3com and Cisco layer 3switches and few Nokia modems. Cisco configs is the hardest part when we started with the setups.

I have here a short video that was taken secretly before it goes for rehabilitation and shelve it in a ventilated cabinets.

Saturday, October 2, 2010

Encrypt Your E-Mail



Your e-mail holds the bulk of your online information. Unfortunately, that information is out in the open. That is, unless you decide to encrypt it so only you can determine who can read it.

The growth of the internet, and e-mail in particular, has given rise to numerous types of encryption software for the secure transmission of information. There are various reasons for wanting to encrypt your e-mail today:

  1. Client confidentiality. You need to transmit sensitive commercial information over e-mail, and you don't want people who sneak onto or steal your computer to compromise your clients' privacy.
  2. You want to avoid prosecution by the government. Perhaps you you live under an authoritarian regime that is trying to infringe on your civil liberties. We'll give you the benefit of the doubt here.
  3. You are a business owner or the head of an organization targeted by digital con artists and you need a system to authenticate your identity amongst your clientele.
  4. You read "Cryptonomicon" by Neal Stephenson and you geeked out on the encryption descriptions
What You'll Need

Encryption on the internet is not unlike your typical lock and key combination. What you'll need to do is choose the lock, in the form of encryption platform, and then generate a key to lock (encrypt) or unlock (decrypt) your data.

Choose your lock

There are various encryption platforms. Some popular standards include:

  • Advanced Encryption Standard (AES)
  • Triple Data Encryption Algorithm (TDEA), X.509
  • Various flavors of Pretty Good Privacy (PGP), including Open PGP and Gnu Privacy Guard (GPG)

Because encryption ought to be tightly integrated with your e-mail client, the standard you end up using is probably going to be determined by what works with your e-mail client of choice. For example, Microsoft Outlook comes with TDEA encryption, Apple's Mail supports X.509 encryption, and there is a GPG add-on for Firefox that works with Google's GMail.

Create your keys

To get started with encryption, you need to create an encryption key pair, which is like a digital signature and pass code. Your e-mail client or stand-alone encryption software might be able to create these keys for you or you may be directed to the web site of a certificate authority such as Thawte or Verisign to create and store your key.

Enter your full name, your e-mail address, and create a pass phrase that will ensure that only you can use your key. Your pass phrase should be fairly long and complicated - you shouldn't use names, dates, addresses, or anything else that can be easily guessed at. One simple method is to use mondegreens; you know, those misinterpreted words you used to sing along with, until you learn what the real lyrics really are and become terribly embarrassed. For example, Jimi Hendrix's "'scuse me, while I kiss this guy."

Certificate authorities create a key pair of both a private and a public key for you. The only people who should have access to your private key are you and the certificate authority; this key is what allows you to encrypt files and decrypt files meant just for you. The public key is freely distributed to anyone you correspond with; it allows other people to check your digital signature to confirm that you are the actual author, and it allows them to encrypt files and messages that only you can decrypt. Depending on the encryption standard you are using, you may have to send people your public key by attaching a file, or it may be automatically downloaded from the certificate authority's public key server.

Start encrypting!

The two most common functions of encryption software are Signing and Encrypting. Signing an e-mail lets anyone who has access to your public key decrypt the message, and serves to confirm that you are the original author. Signing is useful in situations where unsavory characters may be sending out fraudulent information in your name and you need people to know what information is really coming from you. Encrypting scrambles plain text or file attachments and only allows the intended recipient to access them. Encrypted files and messages are also signed as a matter of course, so the recipient can also confirm that the message they are decoding did actually come from you.

In the Future

As computers get more powerful, it becomes easier to crack encryption. In fact, one of the very first digital computers ever created, Colossus, was used to decrypt German codes during World War II. Typically as code breakers get more powerful, encryption systems just use longer and longer codes to slow down brute-force attempts to guess them: right now most desktop encryption software offers up to 4,096-bit encryption.

An entirely new system of encryption is being developed that takes advantage of the principles of quantum mechanics: quantum encryption creates an entangled key pair of qubits that is shared among two parties. These entangled qubits allow the two parties to share information securely, and - due to the peculiar role observation plays in quantum mechanics - also alerts them if anyone is attempting to eavesdrop on their secure channel. Quantum cryptography is already running on experimental military and university communication networks, and if the example of the World War II code-breaking machines is any indication, it's only a matter of time until the technology trickles down to consumers.

Thursday, July 8, 2010

DIY tablet kit is less than $400, more complicated than an iPad




Tired of The Man holding you down on the tablet front with his oppressive App Stores, his tyrannical carrier constraints, and other outrageous insults to your civil liberties? Well now you can break free of this stranglehold, thanks to a company called Liquidware and its open source, DIY tablet starter kit. The premise is simple: Liquidware provides a touchscreen OLED display (4.3-inch, 480 x 272, resistive touch), the BeagleBoard guts (a single-board computer driven by a 720MHz ARM Cortex-A8 OMAP3530 CPU, with 2GB of NAND and an SD card slot), and the BeagleJuice battery module, along with an SD card pre-loaded with Angstrom Linux. You put all the pieces together and then just basically go nuts, designing your own application marketplace, infrastructure for direct-to-consumer video and audio sales, and a revolutionary and magical user interface that blurs the lines between waking life and a hallucinatory dream-state where anything is possible, and the only limitation is yourself. Check the Moscone Center's booking information below to see scheduling availability for your developer conference, and hit the source link to offer up your $393.61 to Liquidware.

Sunday, May 23, 2010

SmartBro ZTE MF637 HSUPA modem unlocking

Recent STF(search the forum) I found how to unlock my ZTE MF637 HSUPA 3g modem.

My intention is to look for MF627 unlocking technique for my SmartBro Plug It modem, I downloaded some apps and follow some instructions posted in some forums.

I did not succeed on MF627. Quite unhappy... I was thinking to put my next target my other modem which is model MF637 for unlocking. At first I'm afraid that it might brick the firmware, because there are some suggestions that it is only intended for MF627. Huhh... the hell...what I was thinking... and so I made up a choice to take the risk.

Before unlocking;

a. My Smartbro dashboard is installed and modem drivers, typical installation for SmartBro to work/connects.

b. Replace your Smartbro sim card (e.g. Globe or Sun SIM)

From one of the applications given to unlock MF627 is DC-Unlocker 2 Client v1.00.0460




1. Download the file DC-Unlocker 2 Client (dccrap.zip)
2. Unzip/Extract to any folder or to your desktop

Now Plug in your Smartbro modem with Globe or Sun SIM inserted on it.

3. run the dccrap.exe
4. Select Manufacturer = ZTE datacards
5. click "server"
6. Enter Username/Password of your choice then click "Check Login".
For me, I enter smartbro for both userb=name and password
7. Click on the the Magnify Glass icon to search your modem model automatically.
Dont need to Select model manually.

Just wait for the modem to sync, sometimes reading the datacard is slow.

8. Once your modem has been detected, Click "Unlocking" then UNLOCK it.

You will be then prompted unlocking successful!

Now, Open your Smartbro dashboard, it takes a while to sync in the modem.

From my experiment, I use Sun sim card. Once it catches the signal, you can notice it from the dashboard, signal .::| and the network name (SUN)

Then I configured my Network Settings to Sun Internet on my dashboard.
Name: Sun Wireless(any name of your choice)
Dial Number: *99#
APN: minternet

Set it to default.

Load up with i50 (24 hours unlimited) with 5 pesos regular load balance.

Then here it goes....


Now I wont have to use a strainer to catch that signal of Smart, because we are near to Sun cell site here in Laguna.


This is the internal antenna of SmartBro Plug-It USB modem



If you find this topic helpful to you, kindly post comments of appreciation.

Goodluck! and happy homebrewing(hacking)... =)

BTW, this USB modem MF637, I got it from an event for free.

Tuesday, May 11, 2010

Ubuntu 10.04 Login Screen and other things.

You want to change the login screen background?
Here is how:
It's best to chage your image to the resolution of your monitor - use gimp?
It may be easier to put the background image you wish in /usr/share/backgrounds first if not already there, doesn't really matter

-log out
-at the log in screen press CTRL+Alt+F1,
-enter user name and password
-Code:
export DISPLAY=:0.0
-press enter
Code:
-sudo -u gdm gnome-control-center
-press enter, expect errors,
-when terminal output stops press CTRL+Alt+F8

The Gnome Control Center should appear (it looks exactly the same as Appearance preferences from the Gnome Desktop, but , it relates to the login screen in this case.)
In Appearance
-choose Add and pick a new background, (or browse to one if it's in a different folder)
-close Gnome Control Center,
-press CTRL+Alt+F1
-at the terminal cursor type code:
sudo reboot

--cybercon
Dell Vostro1400 Core2Duo T7250,4GB DDR2,Ubuntu-10.04LTS 64bit|Windows 7 Premium 64bit

Sunday, May 9, 2010

External antenna plug in to USB Plug It Modems

http://fasterusb.blogspot.com/




Php490.00 external antenna plug in to usb to increase signal and speed on your USB plug it
Tuesday, December 22, 2009
I found another source for a low cost antenna to increase broadband signals for your internet USB plug it for SUN, GLOBE or SMART, Just place it in a window to get more strength and faster internet browsing.

Company: Wireless Link Technologies, Inc
Address: 540 Gonzalo Puyat St., Sta. Cruz, Manila
Telephone: (632) 3936848
Mobile: +639227493272
Email: info@wireless-link.net
P 490.00
Contact Nos. : 632 3936848, +639227493272

Terminal Command Line Web Browsing


We have all been introduced to a graphical web browsing about couple of decades, from way back use of Netscape and then comes IE developed by Microsoft and now with Firefox as well with other browsing tools available for both mobile and desktop computing.

How bout going back to an oldschool BBS or maybe using the CLI(command line interface) for discreet browsing. CLI browsing doesn't load images for graphical view and more of a keyboard typing is required.

Have anyone gone to BBS(bulletin Board System)? It is a command line interface using telnet or HyperTerminal which can connect to forums, emails, relay chatting, file transfer etc.



For some noob linux users, have you tried browsing the web using your Terminal command line interface?

There is some enhanced command lines that can be use in order to browse the web with CLI or Terminal. I use this mostly in some forum sites and emails.

Here's how.

#For Ubuntu you can use the 'w3m' command

#open your Terminal

$ w3m www.google.com

# Or you may explore the command extension for your preference with the help menu

$ w3m --help
or
$ w3m

There are also other which has same function and feature. You may also try 'links', 'links2' & 'lynx'
depending on which flavor you'd prefer. For me, I use links and links2 command. Also, some mouse clicks works with it, but still requires more of a typing skills.

You may also install it all so you can shift either which to use.

$ sudo apt-get install lynx

ex.
$ lynx www.xcon-technix.blogspot.com

$ sudo apt-get install links

ex.
$ links www.xcon-technix.blogspot.com

$ sudo apt-get install links2

ex.
$ links2 www.xcon-technix.blogspot.com



--Cyb3rc0n-05092010

/end

Saturday, May 8, 2010

How to connect to a wireless network from the Ubuntu command line

Why use a friendly GUI when there’s cryptic shell commands out there?

Here’s how I connect:


$ sudo iwlist eth1 scan # eth1 is my wireless card.
eth1 Scan completed :
Cell 01 - Address: 0A:1D:19:15:C2:C1
ESSID:"airborneaccess"
Mode:Master
Channel:5
Frequency:2.432 GHz (Channel 5)
Quality=88/100 Signal level=-44 dBm Noise level=-81 dBm
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:tsf=0000003befa89182



That scan lists every available access point. The important piece of information to extract here is the ESSID. Now I set my wireless card up to connect to that ESSID:


$ sudo iwconfig eth1 essid "ESSID of your acceesspoint"


And finally, I tell my card to request an IP address from the router:


$ sudo dhclient eth1 # gimme an IP address plz!
There is already a pid file /var/run/dhclient.pid with pid 6911
killed old client process, removed PID file
Internet Systems Consortium DHCP Client V3.0.6
Copyright 2004-2007 Internet Systems Consortium.
All rights reserved.
For info, please visit http://www.isc.org/sw/dhcp/

wmaster0: unknown hardware address type 801
wmaster0: unknown hardware address type 801
Listening on LPF/eth1/00:1c:bf:96:7e:21
Sending on LPF/eth1/00:1c:bf:96:7e:21
Sending on Socket/fallback
DHCPREQUEST of 192.168.1.112 on eth1 to 255.255.255.255 port 67
DHCPACK of 192.168.1.112 from 192.168.1.1
bound to 192.168.1.112 -- renewal in 251284 seconds.


I can type these three commands way faster than waiting for the GUI to fire up. Here they are again, without all the output:


$ sudo iwlist eth1 scan
$ sudo iwconfig eth1 essid "ESSID of your acceesspoint"
$ sudo dhclient eth1


Sometimes, I need to connect to a network with a hidden ESSID. That’s just as easy. I just configure the ethernet card to connect to anything:


$ sudo iwconfig eth1 essid any # any is a keyword, not the name of an ESSID.


Finally, some networks require an access key. Sometimes, people can give you the human-friendly version, and you can type that in like this:


$ sudo iwconfig eth1 key s:password # translates to the hex for me.


Note the s: in front. That translates what I type into the hex jibberish.

Other times, people insist on giving you the goofy string of hex digits, so you can set it like this:


$ sudo iwconfig eth1 key ACDB-1234-1234-EFG2

How to connect to a wireless network from the Ubuntu command line

Why use a friendly GUI when there’s cryptic shell commands out there?

Here’s how I connect:


$ sudo iwlist eth1 scan # eth1 is my wireless card.
eth1 Scan completed :
Cell 01 - Address: 0A:1D:19:15:C2:C1
ESSID:"bestcoffee"
Mode:Master
Channel:5
Frequency:2.432 GHz (Channel 5)
Quality=88/100 Signal level=-44 dBm Noise level=-81 dBm
Encryption key:off
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Extra:tsf=0000003befa89182


That scan lists every available access point. The important piece of information to extract here is the ESSID. Now I set my wireless card up to connect to that ESSID:


$ sudo iwconfig eth1 essid "bestcoffee"


And finally, I tell my card to request an IP address from the router:


$ sudo dhclient eth1 # gimme an IP address plz!
There is already a pid file /var/run/dhclient.pid with pid 6911
killed old client process, removed PID file
Internet Systems Consortium DHCP Client V3.0.6
Copyright 2004-2007 Internet Systems Consortium.
All rights reserved.
For info, please visit http://www.isc.org/sw/dhcp/

wmaster0: unknown hardware address type 801
wmaster0: unknown hardware address type 801
Listening on LPF/eth1/00:1c:bf:96:7e:21
Sending on LPF/eth1/00:1c:bf:96:7e:21
Sending on Socket/fallback
DHCPREQUEST of 192.168.1.112 on eth1 to 255.255.255.255 port 67
DHCPACK of 192.168.1.112 from 192.168.1.1
bound to 192.168.1.112 -- renewal in 251284 seconds.


I can type these three commands way faster than waiting for the GUI to fire up. Here they are again, without all the output:


$ sudo iwlist eth1 scan
$ sudo iwconfig eth1 essid "bestcoffee"
$ sudo dhclient eth1


Sometimes, I need to connect to a network with a hidden ESSID. That’s just as easy. I just configure the ethernet card to connect to anything:


$ sudo iwconfig eth1 essid any # any is a keyword, not the name of an ESSID.


Finally, some networks require an access key. Sometimes, people can give you the human-friendly version, and you can type that in like this:


$ sudo iwconfig eth1 key s:password # translates to the hex for me.


Note the s: in front. That translates what I type into the hex jibberish.

Other times, people insist on giving you the goofy string of hex digits, so you can set it like this:


$ sudo iwconfig eth1 key ACDB-1234-1234-EFG2

Lucid Lynx 10.04 LTS

Upgraded to new LTS version of Linux Ubuntu 10.04 64bit




But still my lapbox is in dual boot with Windows 7 and using GRUB as my boot loader to select either OS. I use linux most of the time, whenever some work related compatibility doesn't seem to run in linux, thats the time I use to run windows 7.

Saturday, April 3, 2010

My Untangle Box

I have recently put up a dedicated server box for my Firewall Enhancement in replace to OpenDNS. This serves my IPS/IDS, Spam Blocker, Ad Blocker, Phish Blocker, and most importantly the Web Filter. Below are the change log feature of version 7.2 from 7.1 you can check out full version features at www.untangle.com



Untangle 7.2 Release Features

We are pleased to announce general availability of Untangle 7.2. Our latest version includes a new free application for internet access control, as well as a host of enhanced features and improvements.
Captive Portal

Terms-of-Use Acceptance: Most businesses, schools and government departments have an Internet policy in force. However, raising awareness of it, and ensuring adherence to it, remains a problem. Untangle Captive Portal enables organizations to display a mandatory default web page to all users, before they are able to access the internet. This Captive Portal web page can display and enforce an acceptable use policy, as well as authenticate users, to control internet access.

Organization may wish to require users that want access to the internet to first agree to the organization’s terms of use. Only on acceptance are they given access to the internet.

Authentication Mechanisms: Captive Portal supports a wide array of authentication mechanisms, from basic local directory-based authentication (on the Untangle server) to authentication through an Active Director server or RADIUS server when coupled with Untangle's Directory Connector.

Maximum Flexibility: Captive Portal is highly customizable. It allows organizations to establish User Defined Capture Rules, to handle a variety of exceptions that may be required. For example, authentication may only be required during a specific time period; certain computers and users may be exempt from authentication by adding them to Pass Lists

Customizable: Captive Portal has a completely customizable log-in page, which allows for organizations to add their own messages to the log-in screen. Web developers can write fully custom login pages allowing for more complex setups, like charging users for internet access.

Access Logs: All attempts to log in to the internet through the Captive Portal are automatically logged. This provides a clear acceptance-of-terms audit trail for organizations and with it the teeth to enforce policy.
Directory Connector

Untangle's AD Connector has been renamed Directory Connector. This is because it now supports both Microsoft Active Directory server, and RADIUS server. This provides a wider range of user directories against which Untangle administrators can authenticate users.

Directory Connector now supports the notion of groups in Microsoft Active Directory server. This significantly reduces the administrative burden for Untangle administrators, as polices can be set for existing AD groups and will automatically apply to all users and subgroups within that group.
Reports

Many enhancements have been made to Reports, including:

* Daily, weekly and monthly reports
* New Highlights: a Summary of all reports
* New "Server" reports show memory, disk, CPU, swap

Other enhancements

For a full list of improvements in Untangle 7.2, please visit
http://wiki.untangle.com/index.php/7.2_Changelog

Sunday, March 28, 2010

ZTE MF637 internal parts "SmartBro Plug-It USB"

I was eager to put an external antenna to my USB modem ZTE MF637, an HSDPA/HSUPA 3.75G from SmartBro Plug-It. I found two internal antenna, one might be the GPRS/EDGE and the other one is for 3G. Though I can't determine well which antenna is 3G and the other. Both has different frequency of operation, whereas 3g UMTS is 2100Mhz and so on.

There is only one internal antenna connector, and which I think is for GPRS/EDGE only.



Saturday, March 27, 2010

Earth Hour

Switch off your lights for (1)one hour, tonight 8:30pm-9:30pm March 27, 2010.

Friday, March 26, 2010

Ethernet over power lines: Netgear makes major improvements

(from TechRepublic)
Using in-house electrical wiring for networking computers usually only happens if wires can’t be run or Wi-Fi connections are less than adequate. Netgear’s new Ethernet over power-line devices may change that.

————————————————————————————————–

Last year, I went through what I consider the perfect storm of network cabling. To explain, I was asked by a client to set up an Ethernet network at one of his rental facilities. For some reason, I could not run cables. To make matters worse, there was an inordinate amount of grounded metal (galvanized studs) acting like RF sponges. That eliminated Wi-Fi gear as an option.

Out of options, I tried Netgear’s Powerline equipment and was disappointed. Bandwidth never came close to what Netgear advertised. Still, the client was not deterred by the limited throughput. They were happy to have anything at all. I guess sneaker networks get old fast.

New and improved

Previously, Netgear offered two product lines, one rated at 85 Mb per second and one at 200 Mb per second. Both were lucky to achieve half that throughput. Still, Netgear seems determined to make Power line Ethernet a viable solution. They just announced a new product line that may take care of the bandwidth problem. The new adapters have the following enhancements :

Throughput speed of 500 Mb per second.
The first devices to comply with IEEE draft P1901 standard.
Prioritized Quality of Service (QoS), important for streaming media applications.
Simple 128-Bit AES encryption, using the “Push-and-secure” button.
Backward compatible with other Netgear Powerline products and equipment from other vendors, if it’s HomePlug AV certified.

Two models

Netgear is offering two models, the Powerline AV 500 Adapter Kit/XAVB5001 (courtesy of Netgear):





As well as the Powerline AV+ 500 Adapter Kit/XAVB5501 (courtesy of Netgear):



Netgear mentions that the devices are designed to leave the second socket of an outlet pair open for use. Also, the XAVB5501 provides a filtered power socket, if outlets are in short supply. Each kit comes with two adapters.

Thursday, March 11, 2010

Install 64-bit Adobe Flash Player on Ubuntu (updated to 9.10)


FlashNow that there is a java browser plugin and a working wine for 64-bit on the Ubuntu repositories, there is not much holding back 64-bit Linux on the desktop. Maybe the only thing missing is the Adobe Flash player. Most of the time Flash is just annoying, nevertheless sometimes needed. Luckily, there is now a Flash Player release for 64-bit Linux (however, still beta alpha but stable so far) . I am pretty sure the instructions are identical for other Linux distributions.

To install it:

1. Download it from here (now here).

2. Unpackage it using a terminal (with the assumption your firefox downloads into your Desktop as default):
cd Desktop
tar xvzf libflashplayer-10.0.32.18.linux-x86_64.so.tar.gz

(The name of the tar.gz file may change when a new version is released, change accordingly).

3. Create a plugin directory in your $HOME (instead of a system directory):

cd
mkdir -p .mozilla/plugins

4. Move the file to the plugin directory:
mv Desktop/libflashplayer.so .mozilla/plugins

5. Restart firefox. Go to about:plugins to see if it’s enabled:
about:plugins


That’s it.

Edit: Alternatively, you can use the graphical approach:

1. go to the download pages and click on “Download 64-bit Plugin for Linux (TAR.GZ, 3.64 MB)”.
2. select “Open with ” in firefox (you have to click on open to enable the ok button) and clck on OK.
3. The archive manager will open and show you the libflashplayer.so file.
4. Click on extra and a save window will open.
5. Type ctrl + h to show hidden files. Go to .mozilla (dubble click).
6. If no “plugins” directory is present, click on “Create Folder” on the top right and type as name “plugins” (without the quotes). Press Ener.
7. Click on Extract.
8. Click on Close on the windows showing the result.
9. Close the archive manager.
10. Restart firefox.

Tuesday, March 2, 2010

The US war on open source

(Credits to Chin Wong, Digital Life, http://url4.eu/1VdVO)

FOR years, American companies have been beating developing countries over the head for copyright violations, egging the US government to threaten trade sanctions against those who do not toe the intellectual property line. Now the same US companies are trying to bludgeon countries such as India, Indonesia, the Philippines, Thailand and Vietnam into abandoning policies that favor open source software for use in their own public agencies.


Let’s think about that for a moment.

These US companies want to dictate to our government how to go about procuring the software that we use. And the weapon they wield is the annual Special 301 Report issued by the Office of the United States Trade Representative, a federal agency responsible for developing and recommending trade policy to the US president.

As part of its yearly review, the US trade agency studies the recommendations submitted by various American trade associations, and puts the worst violators of intellectual property rights into its Priority Watch List, a group that could face US trade sanctions.

The International Intellectual Property Alliance (IIPA), an umbrella organization of about 1,900 US companies from the publishing, film and TV, music and software industries, has been religious in making its voice heard in the annual review.

In its latest report, a 498-page document, the IIPA recommended that the Philippines be moved into the Priority Watch List for a number of continuing copyright problems, including our easy access to cheap DVD entertainment.

Then, in a portion on draft legislation, it added: “IIPA was concerned regarding reports of consideration of a Free Open Source Software bill which would require government offices to use open source software. Passage of that bill would deny technology choice regarding software usage and ultimately would stunt the growth of the IT industry in the Philippines.”

The group was even more hostile when it came to Indonesia, Thailand and Vietnam, which already have such policies in place. In these instances, the US trade group argued that open source doesn’t really reduce piracy and may even encourage it by not giving software its proper value.

In one part of the report, the IIPA takes Thailand to task for wanting to bundle free and open source software on 1.4 million computers for the school system as a way of saving money and ensuring that the programs used are not pirated.

Elsewhere, the association strongly urges the US Trade Representative “to consider the implications that Indonesia’s open source preference policy has on IP protection and access to Indonesia’s market for US goods and services.”

“The Indonesian government’s policy… simply weakens the software industry and undermines its long-term competitiveness by creating an artificial preference for companies offering open source software and related services, even as it denies many legitimate companies access to the government market,” the IIPA said. “Rather than fostering a system that will allow users to benefit from the best solution available in the market, irrespective of the development model, it encourages a mindset that does not give due consideration to the value to intellectual creations. As such, it fails to build respect for intellectual property rights.”


The last sentence is a steaming pile of cow manure. Open source advocates and developers respect intellectual property rights; that’s why open source projects are covered by licenses, too. Users just don’t have to pay exorbitant fees for them.

In attacking open source, the IIPA neglects to point out that major American technology companies, including IBM and Oracle, already do a substantial amount of business using this model. Would they, too, be denied access to government bids that required open source solutions?

In any commercial transaction, the buyer must be free to set the terms of the sale. In the case of public agencies, that buyers is ultimately the government. If the government wants to buy, say, combat boots that are built to certain specifications, manufacturers who cannot meet those requirements should not whine about limited market access. They should just build better boots.

If the government wants to save on licensing fees by going open source, nobody, least of all software companies with vested interests, should be able to stop them from doing so. Nor should the US government, which itself uses open source software, buy into this rubbish that doing so somehow corrodes intellectual property rights. That’s just silly.


Posted by Chin on 03/02/10 at 08:49 AM

Thursday, February 18, 2010

3G vs. Terrestrial Broadband

3G vs. Terrestrial Broadband
Lincoln Spector

Jan 5, 2010 12:16 am

Phil Kunde wants to know if the 3G Internet access available through his cell phone provider makes a viable alternative to conventional broadband such as cable or DSL.

Not in my book. While cell-based Internet access has one big advantage--you can access the Internet on your PC anywhere you can use your cell phone--it contains some very serious negatives.

For one thing, it's slow. Cell carriers like Sprint and Verizon promise download speeds that top out at only about 1.4Mbps--and can drop as low as .6Mbps. "Wireless signal, by its nature, is extremely variable; that is, many things, such as obstruction by fixed objects (buildings, trees, etc.), weather, network load, cell tower locations, and time of day, can affect the quality of the signal," says Mark Sullivan in A Day in the Life of 3G. (I'm sticking to 3G numbers here because, as I write this, the much faster 4G is still relatively rare in the United States.)

By comparison, 6Mbps DSL and 16Mbps cable connections are readily available.

The difference gets more extreme when you take price into consideration. AT&T charges the same $35 a month for 6Mbps DSL and 1.4Mbps (if you're lucky) 3G. But the $35 3G plan sticks you with a 200MB monthly allowance; I've downloaded individual files bigger than that. For $60 a month, you get 5GB, which is more reasonable but still wouldn't cover my family's Internet habits.

Speaking of families, a 3G connection can be shared in a way similar to broadband--one point in its favor. You do this with a small, router-like MiFi device that you purchase from your carrier. It's small, portable, and can connect up to five WiFi-enabled devices to your 3G Internet signal. Using one regularly with several people, of course, pretty much guarantees that you'll hit that 5GB limit early each month.

Depending on your lifestyle or working conditions, cell-based Internet access may very well be invaluable. But unless you're like George Clooney's character in Up in the Air--constantly traveling, never at home, and with no family--it's not a valid replacement for DSL or cable.

At least not yet.

Add your comments to this article below. If you have other tech questions, email them to me at answer@pcworld.com, or post them to a community of helpful folks on the PCW Answer Line forum.



See more like this:internet,broadband,mobile broadband,networks,routers

MiFi: The Best Product of 2009


MiFi: The Best Product of 2009

Posted using ShareThis